Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Database Management, Databases, Relational Databases, Data Security, User Accounts, SQL, Stored Procedure, Database Design, Application Security, Threat Modeling, Vulnerability Scanning, Cybersecurity, NoSQL, Data Integrity, Role-Based Access Control (RBAC), Encryption
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Cloud Services, Cybersecurity, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Cloud Platforms, Encryption, Data Storage, Cyber Attacks, Software Development Life Cycle, Networking Hardware, Application Development, Information Technology, Cloud Computing, Databases, Computer Hardware, Computer Systems
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Cloud Applications, Kubernetes, Cloud Computing, CI/CD, Cloud Security, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Cloud Computing Architecture, Cloud Storage, Data Storage, Network Architecture
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Agile Software Development, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, DevOps, Code Coverage, OpenShift, Cloud Applications, Containerization, Agile Methodology, Behavior-Driven Development, Secure Coding, Grafana, System Monitoring
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Infrastructure as Code (IaC), Amazon DynamoDB, Amazon Web Services, Continuous Integration, DevOps, Cloud Computing, Amazon S3, Scalability, AWS CloudFormation, Cloud Infrastructure, Amazon Elastic Compute Cloud, CI/CD, Cloud Security, Devops Tools, Continuous Deployment, Application Deployment, Development Environment, MLOps (Machine Learning Operations)
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Apache Hadoop, Product Lifecycle Management, Business Technologies
In summary, here are 10 of our most popular breach (security exploit) courses
- Database Essentials and Vulnerabilities:Â IBM
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Information Technology (IT) and Cloud Fundamentals:Â IBM
- IBM DevOps and Software Engineering:Â IBM
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Enterprise and Infrastructure Security:Â New York University
- Architecting with Google Compute Engine:Â Google Cloud
- IBM Applied DevOps Engineering:Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- DevOps on AWS:Â Amazon Web Services